Results 1 - 10
of
2,145
Information Hiding -- A Survey
, 1999
"... Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised ..."
Abstract
-
Cited by 280 (0 self)
- Add to MetaCart
Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised
Reversible Authentication Watermark for Image
, 2008
"... Reversible (invertible, lossless) authentication draws much attention recently for its ability to restore the original image from marked image without any distortions upon verification. In this paper, we propose a reversible watermarking scheme for image authentication based on histogram modificatio ..."
Abstract
- Add to MetaCart
Reversible (invertible, lossless) authentication draws much attention recently for its ability to restore the original image from marked image without any distortions upon verification. In this paper, we propose a reversible watermarking scheme for image authentication based on histogram
Reversible data hiding
- IEEE Trans. Circuits Syst. Video Technol
, 2006
"... Abstract—A novel reversible data hiding algorithm, which can recover the original image without any distortion from the marked image after the hidden data have been extracted, is presented in this paper. This algorithm utilizes the zero or the minimum points of the histogram of an image and slightly ..."
Abstract
-
Cited by 123 (4 self)
- Add to MetaCart
the original image is guaranteed to be above 48 dB. This lower bound of PSNR is much higher than that of all reversible data hiding techniques reported in the literature. The computational complexity of our proposed technique is low and the execution time is short. The algorithm has been successfully applied
Vigilante: End-to-End Containment of Internet Worm Epidemics
, 2008
"... Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. ..."
Abstract
-
Cited by 299 (6 self)
- Add to MetaCart
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level
Data Hiding in Binary Images for Authentication and Annotation
- IEEE Trans. on Multimedia
, 2004
"... Abstract—This paper proposes a new method to embed data in binary images, including scanned text, figures, and signatures. The method manipulates “flippable ” pixels to enforce specific blockbased relationship in order to embed a significant amount of data without causing noticeable artifacts. Shuff ..."
Abstract
-
Cited by 54 (7 self)
- Add to MetaCart
embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents. The paper also presents analysis and discussions on robustness and security issues. Index Terms—Annotation, authentication, binary image, data hiding, digital watermarking. I.
Data-Hiding Codes
- Proc. IEEE
, 2005
"... This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital m ..."
Abstract
-
Cited by 56 (4 self)
- Add to MetaCart
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital
Multimedia Data Hiding
- in Digital Binary Image,” IEEE Int. Conf. Multimedia and Expo, ICME’00
, 2002
"... The digital information revolution has brought about profound changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. This thesis discusses the issues regarding multimedia data hiding and its applicatio ..."
Abstract
-
Cited by 53 (15 self)
- Add to MetaCart
The digital information revolution has brought about profound changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. This thesis discusses the issues regarding multimedia data hiding and its
Stereo Image Reversible Watermarking
"... Abstract – In this paper, a new reversible watermarking method is presented that reduces the size of a stereoscopic image pair while keeping its content visible. The proposed technique embeds the disparity compensated difference and the disparity vectors of the stereo pair into the reference image, ..."
Abstract
- Add to MetaCart
Abstract – In this paper, a new reversible watermarking method is presented that reduces the size of a stereoscopic image pair while keeping its content visible. The proposed technique embeds the disparity compensated difference and the disparity vectors of the stereo pair into the reference image
Results 1 - 10
of
2,145